Analysis

  • max time kernel
    68s
  • max time network
    172s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-en-20220113
  • submitted
    01-02-2022 08:45

General

  • Target

    f94096a70558a634ae582a95ef76554a180409bab2b1622098a791ab49242951.exe

  • Size

    64KB

  • MD5

    4656312ad5222fda9e841d4daf104b54

  • SHA1

    f60cc28ddeed76b8d20bdc4e6037432a7e71fd51

  • SHA256

    f94096a70558a634ae582a95ef76554a180409bab2b1622098a791ab49242951

  • SHA512

    4abdf6740bacc731998208248defa4b09f49c2f7921306272dbf92f11419863edee47ebe74ee4b7b863858436bb7fb0c4d93dd01e3a40f77dc3ac980ef35a9e4

Score
8/10

Malware Config

Signatures

  • Sets service image path in registry 2 TTPs
  • Drops file in Windows directory 6 IoCs
  • Modifies data under HKEY_USERS 41 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f94096a70558a634ae582a95ef76554a180409bab2b1622098a791ab49242951.exe
    "C:\Users\Admin\AppData\Local\Temp\f94096a70558a634ae582a95ef76554a180409bab2b1622098a791ab49242951.exe"
    1⤵
      PID:4676
    • C:\Windows\System32\WaaSMedicAgent.exe
      C:\Windows\System32\WaaSMedicAgent.exe 184c0bddf4919fcc518f39771175c7e1 DtzYR4PCy0KeC6s7UGGf8A.0.1.0.0.0
      1⤵
      • Modifies data under HKEY_USERS
      PID:1524
    • C:\Windows\system32\svchost.exe
      C:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv
      1⤵
      • Drops file in Windows directory
      • Suspicious use of AdjustPrivilegeToken
      PID:3996

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/3996-130-0x000001AA8D130000-0x000001AA8D140000-memory.dmp

      Filesize

      64KB

    • memory/3996-131-0x000001AA8D190000-0x000001AA8D1A0000-memory.dmp

      Filesize

      64KB

    • memory/3996-132-0x000001AA8FEA0000-0x000001AA8FEA4000-memory.dmp

      Filesize

      16KB